Sciweavers

5255 search results - page 237 / 1051
» Formal Methods for Privacy
Sort
View
105
Voted
IGPL
2010
113views more  IGPL 2010»
15 years 1 months ago
Permissive nominal terms and their unification: an infinite, co-infinite approach to nominal techniques
Gilles Dowek, Murdoch James Gabbay, Dominic P. Mul...
139
Voted
SIAMDM
2011
14 years 7 months ago
Counting Independent Sets Using the Bethe Approximation
Venkat Chandrasekaran, Misha Chertkov, David Gamar...
KI
2002
Springer
15 years 3 months ago
Formal Properties of Constraint Calculi for Qualitative Spatial Reasoning
In the previous two decades, a number of qualitative constraint calculi have been developed, which are used to represent and reason about spatial configurations. A common property...
Bernhard Nebel, Alexander Scivos
ICSE
1999
IEEE-ACM
15 years 8 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
HICSS
2005
IEEE
151views Biometrics» more  HICSS 2005»
15 years 9 months ago
Inheritance in the Presence of Asynchronous Method Calls
— This paper considers a formal object-oriented model for distributed computing. Object orientation appears as a leading framework for concurrent and distributed systems. However...
Einar Broch Johnsen, Olaf Owe